Uploaded by Shaunak Batra

UCT513 (9)

advertisement
Roll Number:
Thapar Institute of Engineering & Technology
Department of Computer Science & Engineering
End Semester Examination
B. E. (III Year): Semester-I (2022-23)
(CSBS)
Date: 15/12/2022
Time: 3 Hours, M. Marks: 40
Course Code: UCT513
Course Name: Machine Learning
Time: 9:00 to 12:00 P.M.
Name Of Faculty: Sushma Jain
Note: Attempt questions and their sub-parts sequentially at one place.
Assume missing data, if any, suitably
Q1
a) With the help of diagram explain supervised, unsupervised and
reinforcement machine learning approaches.
b) Explain the need of backpropagation algorithm in Multilayer Neural
Network.
Q2 a) Explain loss function of linear regression and logistic regression with the help
of equations.
b) Activation functions play an important role in neural network. Justify.
c) Zero initialization of weights is not a good initialization technique in
neural networks. Justify.
d) Cost function which is used for linear regression can't be used for logistic
regression. Justify.
Q.3 a) Differentiate bagging and boosting.
b) Suppose the following set of data with three Boolean input variables
a; b; and c, and a single Boolean output variable K.
,
1
1
0
1
1
0
0
0
/,
0
1
1
,
1
1
1
/,1
1
0
1
0
0
0
0
0
1
0
0
1
0
0
1
1
f)
Given a data tuple having the values '0', '1', and '0' for the attributes
a, b, and c, respectively, what would a Naive Bayesian classification
of the K for the tuple be?
c) Suppose that the dataset in the figure shown below contains two
classes '+' and '-`. The data is randomly split into a training set (90%)
and a test set (10%) to train and evaluate a model. Which classifier
KNN (with K=1) or Naïve Bayes perform better in terms of accuracy.
Justify?
A
Y
+
X
[1]
(4)
(4)
(2)
(2)
(2)
(2)
(2)
(3)
(3)
Suppose the following Table is a distance matrix for six objects.
Initially there are six clusters. Group these clusters in a single cluster
using hierarchical clustering with single link approach. Show all
intermediate results.
E
F
A
B
C
D
3.61
4.24
3.20
A
0.00
0.71
5.66
2.50
0.71
0.00
4.95
3.54
B
2.92
2.50
5.66
4.95
0.00
2.24
1.41
C
3.61
2.92
2.24
0.00
1.00
0.50
D
4.24
1.12
3.54
0.00
E
1.41
1.00
F
3.20
2.50
2.50
0.50
1.12
0.00
Q.5 a) Explain Hidden Markov Model in brief and list its applications.
b) For the below mentioned grocery store transaction data-set, generate
rules using Apriori algorithm. Consider the values of Support=33.34%
and Confidence-60%.
Transaction
Items
ID
T1
HotDogs, Buns, Ketchup
T2
HotDogs, Buns
T3
HotDogs, Coke, Chips
T4
Chips, Coke
T5
Chips, Ketchup
T6
HotDogs, Coke, Chips
Q.4
[2]
(8)
(3)
(5)
Roll Number:
Thapar Institute of Engineering and Technology, Patiala
Department of Computer Science & Engineering
BE- CSBS (VII Semester) EST
UCT723: Cryptology
Dec 14, 2022, 4:30 PM
Time: 03 Hours; MM: 40
Name of Faculty: Dr. Rajkumar Tekchandani
Note: Attempt all questions. Assume missing data if any.
Q1 .a) Distinguish between passive and active security attacks. List some passive
and active attacks.
b) An organization is implementing an electronic voting (e-voting) system to
elect their president. Only the employees of organization are allowed to vote
online at a voting website that the IT department of organization is
implementing. What security attributes are to be considered for the e-voting
system?
(3)
Q2. a) Explain Advanced Encryption Standard (AES) Key Expansion algorithm.
b) Alice encrypted the plain text (in hexadecimal) of 128 bits {54 77 6F 20 4F
6E 65 20 4E 69 6E 65 20 54 77 6F} with the key (in hexadecimal) of 128
bits {54 68 61 74 73 20 6D 79 20 4B 75 6E 67 20 46 75} using Advanced
Encryption Standard-128 and sent the encrypted message to Bob.
i. Find the value of output state matrix ( 4 x 4) after initial Add Round
Key.
ii. Compute the single entry S'(0,0) of mix column transformation state by
multiplying the first row of mix column transformation matrix as
[EB
(3)
[02 03 01 01] with the following sequence of input bytes
(2)
(3)
(4)
9
c3
7 . Use
20
irreducible polynomial as x' + x4 + x3 + x + 1.
Q3. a) What is the key pair of public key and private key in RSA? What is its
significance? Encrypt and decrypt the letter "H" using RSA by choosing two
prime numbers as p = 11 and q = 3?
b) Explain Elliptic curve cryptography (ECC). What is the zero point of an
Elliptic Curve?
c) Consider the Elliptic curve as [E: y2 = x3 + 2x + 2 mod 17] defined over a
field Z17 . If the point P on elliptic curve is (5,1) then find 2P. Also, Prove
that the calculated point 2P lies on Elliptic curve "E".
(4)
(3)
(4)
Q4. Explain Diffie-Hellman Key Exchange Method? User (A) and (B) uses the (4)
Diffie-Hellman Key Exchange technique with a common prime q = 11 and a
primitive root a = 2.
i.
If user A has public key YA = 9, what is A's private key XA?
ii.
If user B has a public key YB = 3, What is the value of shared secret
key K with user A?
Q5.a) What is the basis for Digital signatures? Explain the working of MD5 Hash
function in brief.
(3)
P.T.O
b) Consider the following X.509 certificate and answer the following
(3)
Certificate:
Data:
Version: 3 (0x2)
Sella' Numbei: 1 (Oxl)
I 1111...1.1 ua:i:•
Algut A t Tun: rual'ildtt hits AK all . ypt a gal
Issuer: C=ZA, ST=Western Cape, L=Cape Town, 0=Thawte Consulting cc,
OU-Certification Setvices Division,
CM=Thawte Setvet CA/Emall=server-certs@thawte.com
vutidAty
Not Before: Aug 1 00:00:00 1996 GMT
Not After : Dec 31 23:59:59 2020 GMT
Subject: C=ZA, ST=Western Cape, L=Cape Town, 0=Thawte Consulting cc,
OU=Certitication Services Division,
CN-Thawte Server CA/Email-servet-certsethawte.com
Subject Public Key Info:
Publla Key Alggrathm: rsaIncrypttun
RSA Public Ke•y: (1024 bit)
Modulus (1024 bit):
00:d3:84:50:6e:c8:ff:56:6b:e6:cf:5d:b6:ea:Oc:
68:75:47:a2:aa:c2:da:84:25:fc:a8:f4:47:51:da:
85:b5:20:74:94:86:1e:Of:75:09:e9:08:61:f5:06:
6d:30:6e:15:19:02:e9:52:c0:62:db:4d:99:9e:e2:
6a:Oc:44:38:cd:fe:be:e3:64:09:70:c5:fe:b1:6b:
29:b6:2f:49:c8:3b:d4:27:04:25:10:97:2f:e7:90:
6d:c0:28:42:99:d7:4c:43:de:c3:f5:21:6d:54:9f:
5d:c3:58:el:c0:e4:d9:5b:b0:b8:dc:b4:7b:df:36:
3a:c2:b5:66:22:12:d6:87:0d
Exponent: 65537 ( Ox10001 )
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE
Signature Algorithm: mti5WathKSAEncryptton
07:f8:4c:69:5c:fb:95:cc:46:ee:85:83:4d:21:30:8e:ca:d9:
a8:6f:49:1a:e6:da:51:e3:60:70:6c:84:61:11:a1:1a:c8:48:
3e:59:43:7d:4f:95:3d:a1:8b:b7:0b:62:98:7a:75:8a:dd:88:
4e:4e:9e:40:db:a8:cc:32:74:b9:6f:Od:c6:e3:b3:44:0b:d9:
8a:6f:9a:29:9b:99:18:28:3b:d1:e3:40:28:9a:5a:3c:d5:b5:
e7:20:1b:8b:ca:a4:ab:86:e9:51:d9:e2:4c:2c:59:a9:da:b9:
b2:75:1b:f6:42:f2:ef:c7:f2:18:f9:89:bc:a3:ff:8a:23:2e:
70:47
i. Who issues the certificate?
ii. Who is the owner of the certificate?
iii. Who generated the digital signature on this certificate, and how can this
signature be verified?
Q6. Explain Quantum cryptography. How information is represented in Quantum (4)
computing? What are various issues related to Quantum cryptography?
Download